-
6
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
J.-P. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), 2001, pp. 146-155.
-
(2001)
Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
7
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
9
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar, "SPINS: Security protocols for sensor networks," in Mobile Computing and Networking, 2001, pp. 189-199.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
10
-
-
0003237987
-
The Kerberos network authentication service (v5)
-
Sept. [Online]
-
J. Kohl and C. Neuman, "The Kerberos network authentication service (v5)," IETF RFC 1510, Sept. 1993. [Online]. Available: http://www.ietf.org/ rfc/rfc1510.txt
-
(1993)
IETF RFC
, vol.1510
-
-
Kohl, J.1
Neuman, C.2
-
11
-
-
0035789267
-
Secure pebblenets
-
ACM Press
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti, "Secure pebblenets," in Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking and computing. ACM Press, 2001, pp. 156-163.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
13
-
-
3042575345
-
Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
-
Mar. [Online]
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach," George Mason University, Tech. Rep. ISE-TR-03-01, Mar. 2003. [Online]. Available: http://www.ise.gmu.edu/techrep/2003/03.01.pdf
-
(2003)
George Mason University, Tech. Rep.
, vol.ISE-TR-03-01
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
14
-
-
0027617271
-
Increasing availability and security of an authentication service
-
L. Gong, "Increasing availability and security of an authentication service," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, pp. 657-662, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
15
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
ser. Lecture Notes in Computer Science
-
F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in 7th International Workshop on Security Protocols, ser. Lecture Notes in Computer Science, 1999, pp. 172-194.
-
(1999)
7th International Workshop on Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
16
-
-
0002439168
-
Zur allgemeinen Kurventheorie
-
K. Menger, "Zur allgemeinen Kurventheorie," Fund. Math., no. 10, pp. 96-115, 1927.
-
(1927)
Fund. Math.
, Issue.10
, pp. 96-115
-
-
Menger, K.1
|